Uploads
Contact
/
Login
Upload
Search Results for 'Secure Network Provenance'
Secure Network Provenance
aaron
Provenance Research
conchita-marotz
On Data Provenance in Group-centric Secure Collaboration
celsa-spraggs
Method of providing Secure Network Channel among Secure OSs
calandra-battersby
As computer network experiments increase in complexity and
tatiana-dople
As computer network experiments increase in complexity and
jane-oiler
Designing and Implementing a PCI-DSS Compliant
stefany-barnette
Technology Requirements
aaron
Exploring Security Synergies in Driverless Car and UAS Inte
trish-goza
A Generic Provenance
yoshiko-marsland
Provenance
conchita-marotz
Open Provenance Model Tutorial
stefany-barnette
Approximated Provenance for Complex Applications
jane-oiler
Data Provenance Environmental Scan
olivia-moreira
An Overview of Data Provenance
calandra-battersby
Using Well-Founded Provenance
alexa-scheidler
Querying Workflow Provenance
giovanna-bartolotta
Open Provenance Model Tutorial
celsa-spraggs
Collaborative Data Sharing with Mappings and Provenance
olivia-moreira
Asian Art Provenance:
pasty-toler
S&I Data Provenance Initiative
calandra-battersby
Update Exchange with Mappings and Provenance
alida-meadow
Query Language Constructs for Provenance
mitsue-stanley
1 Provenance-Based Access Control (PBAC)
yoshiko-marsland
1
2
3
4
5
6